In this paper the evolution characteristics of the fidelity of quantum information for the V-type three-level atom interacting with number state light field in Kerr meddium are investigated. It shows that the periodic...In this paper the evolution characteristics of the fidelity of quantum information for the V-type three-level atom interacting with number state light field in Kerr meddium are investigated. It shows that the periodicity of the evolutions of fidelity of quantum information is influenced by the Kerr coefficient, the photon number of the initial field and intensity of light. The evolutions of the fidelity of quantum information are modulated by the initial number state field. The Rabi oscillation frequency and the modulation frequency of fidelity for the field and the system vary with the value of the Kerr coefficient. The evolutions of fidelity of quantum information obviously show the quantum collapse and revival behaviours in the system of atom interacting with light field.展开更多
The quantum phase properties of the generalized squeezed vacuum states associated with solvable quantum systems are studied by using the Pegg-Barnett formalism.Then,two nonclassical features,i.e.,squeezing in the numb...The quantum phase properties of the generalized squeezed vacuum states associated with solvable quantum systems are studied by using the Pegg-Barnett formalism.Then,two nonclassical features,i.e.,squeezing in the number and phase operators,as well as the number-phase Wigner function of the generalized squeezed states are investigated.Due to some actual physical situations,the present approach is applied to two classes of generalized squeezed states:solvable quantum systems with discrete spectra and nonlinear squeezed states with particular nonlinear functions.Finally,the time evolution of the nonclassical properties of the considered systems has been numerically investigated.展开更多
The existing decoy-state quantum key distribution(QKD)beating photon-number-splitting(PNS)attack provides a more accurate method to estimate the secure key rate,while it still considers that only single-photon pulses ...The existing decoy-state quantum key distribution(QKD)beating photon-number-splitting(PNS)attack provides a more accurate method to estimate the secure key rate,while it still considers that only single-photon pulses can generate secure keys in any case.However,multiphoton pulses can also generate secure keys if we can detect the possibility of PNS attack in the channel.The ultimate goal of this line of research is to confirm the absence of all types of PNS attacks.In particular,the PNS attack mentioned and detected in this paper is only the weaker version of PNS attack which significantly changes the observed values of the legitimate users.In this paper,under the null hypothesis of no weaker version of PNS attack,we first determine whether there is an attack or not by retrieving the missing information of the existing decoy-state protocols,extract a Cauchy distribution statistic,and further provide a detection method and the type I error probability.If the result is judged to be an attack,we can use the existing decoy-state method and the GLLP formula to estimate the secure key rate.Otherwise,the pulses with the same basis received including both single-photon pulses and multiphoton pulses,can be used to generate the keys and we give the secure key rate in this case.Finally,the associated experiments we performed(i.e.,the significance level is 5%)show the correctness of our method.展开更多
In the existing formalism of quantum states, probability amplitudes of quantum states are complex numbers. A composition of entangled quantum states, such as a Bell state, cannot be decomposed into its constituent qua...In the existing formalism of quantum states, probability amplitudes of quantum states are complex numbers. A composition of entangled quantum states, such as a Bell state, cannot be decomposed into its constituent quantum states, implying that quantum states lose their identities when they get entangled. This is contrary to the observation that a composition of entangled quantum states decays back to its constituent quantum states. To eliminate this discrepancy, this paper introduces a new type of numbers, called virtual numbers, which produce zero upon multiplication with complex numbers. In the proposed formalism of quantum states, probability amplitudes of quantum states are general numbers made of complex and virtual numbers. A composition of entangled quantum states, such as a Bell state, can then be decomposed into its constituent quantum states, implying that quantum states retain their identities when they get entangled.展开更多
Topological phases and their associated multiple edge states are studied by constructing a one-dimensional non-unitary multi-period quantum walk with parity-time symmetry.It is shown that large topological numbers can...Topological phases and their associated multiple edge states are studied by constructing a one-dimensional non-unitary multi-period quantum walk with parity-time symmetry.It is shown that large topological numbers can be obtained when choosing an appropriate time frame.The maximum value of the winding number can reach the number of periods in the one-step evolution operator.The validity of the bulk-edge correspondence is confirmed,while for an odd-period quantum walk and an even-period quantum walk,they have different configurations of the 0-energy edge state andπ-energy edge state.On the boundary,two kinds of edge states always coexist in equal amount for the odd-period quantum walk,however three cases including equal amount,unequal amount or even only one type may occur for the even-period quantum walk.展开更多
It is a fact that imaginary numbers do not have practical significance. But the role of imaginary numbers is very broad and enormous, due to the existence of Euler’s formula. Due to Euler’s formula, imaginary number...It is a fact that imaginary numbers do not have practical significance. But the role of imaginary numbers is very broad and enormous, due to the existence of Euler’s formula. Due to Euler’s formula, imaginary numbers have been applied in many theoretical theories. One of the biggest functions of imaginary numbers is to represent changes in phase, which is indispensable in signal analysis theory. The imaginary numbers in quantum mechanics pose a greater mystery: do the imaginary numbers really exist? This question still needs further scientific development to be answered.展开更多
This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are dis...This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are discussed, along with quantum vulnerabilities in public key infrastructure and symmetric cryptographic algorithms. Other relevant non-encryption-specific areas within cybersecurity are similarly raised. The evolution and expansion of cyberwarfare as well as new developments in cyber defense beyond post-quantum cryptography and quantum key distribution are subsequently explored, with an emphasis on public and private sector awareness and vigilance in maintaining strong security posture.展开更多
Based on the fact that a two-mode squeezed number state is a two-variable Hermite polynomial excitation of the two-mode squeezed vacuum state, the result of one-mode l-photon measurement for the two-mode squeezed numb...Based on the fact that a two-mode squeezed number state is a two-variable Hermite polynomial excitation of the two-mode squeezed vacuum state, the result of one-mode l-photon measurement for the two-mode squeezed number state S2|m, n) is discussed. It is found that a remaining field-mode simultaneously collapses into a number state |n - m+l| with the coefficient being a Jacobi polynomial of n, m and l, which manifestly exhibits the entanglement between the two modes, i.e. it depends on the number-difference between the two modes. The second mode collapses into an excited coherent state when the first mode is measured as a coherent state.展开更多
The spin transport properties are theoretically investigated when a quantum dot(QD)is side-coupled to Majorana bound states(MBSs)driven by a symmetric dipolar spin battery.It is found that MBSs have a great effect on ...The spin transport properties are theoretically investigated when a quantum dot(QD)is side-coupled to Majorana bound states(MBSs)driven by a symmetric dipolar spin battery.It is found that MBSs have a great effect on spin transport properties.The peak-to-valley ratio of the spin current decreases as the coupling strength between the MBS and the QD increases.Moreover,a non-zero charge current with two resonance peaks appears in the system.In the extreme case where the dot-MBS coupling strength is strong enough,the spin current and the charge current are both constants in the non-resonance peak range.When considering the effect of the Zeeman energy,it is interesting that the resonance peak at the higher energy appears one shoulder.And the shoulder turns into a peak when the Zeeman energy is big enough.In addition,the coupling strength between the two MBSs weakens their effects on the currents of the system.These results are helpful for understanding the MBSs signature in the transport spectra.展开更多
Quantum system is inevitably affected by the external environment in the real world.Two controlled quantum dialogue protocols are put forward based on logicalχ-type states under collective noise environment.One is ag...Quantum system is inevitably affected by the external environment in the real world.Two controlled quantum dialogue protocols are put forward based on logicalχ-type states under collective noise environment.One is against collectivedephasing noise,while the other is against collective-rotation noise.Compared with existing protocols,there exist several outstanding advantages in our proposed protocols:Firstly,theχ-type state is utilized as quantum channels,it possesses better entanglement properties than GHZ state,W state as well as cluster state,which make it difficult to be destroyed by local operations.Secondly,two kinds of logicalχ-type states are constructed by us in theory,which can be perfectly immune to the effects of collective noise.Thirdly,the controller can be offline after quantum distribution and permission announcement,without waiting for all the participants to complete the information coding.Fourthly,the security analysis illuminates that our protocols can not only be free from the information leakage,but also resist against the interceptand-resend attack,the entanglement-and-measure attack,the modification attack,the conspiring attack,and especially the dishonest controller’s attacks.展开更多
In the classical lattice theory, solitons and localized modes can exist in many one-dimensional nonlinear lattice chains, however, in the quantum lattice theory, whether quantum solitons and localized modes can exist ...In the classical lattice theory, solitons and localized modes can exist in many one-dimensional nonlinear lattice chains, however, in the quantum lattice theory, whether quantum solitons and localized modes can exist or not in the one-dimensional lattice chains is an interesting problem. By using the number state method and the Hartree approximation combined with the method of multiple scales, we investigate quantum solirons and localized modes in a one-dimensional lattice chain with the nonlinear substrate potential. It is shown that quantum solitons do exist in this nonlinear lattice chain, and at the boundary of the phonon Brillouin zone, quantum solitons become quantum localized modes, phonons are pinned to the lattice of the vicinity at the central position j = j0.展开更多
In order to improve the attack efficiency of the New FORK-256 function, an algorithm based on Grover's quantum search algorithm and birthday attack is proposed. In this algorithm, finding a collision for arbitrary...In order to improve the attack efficiency of the New FORK-256 function, an algorithm based on Grover's quantum search algorithm and birthday attack is proposed. In this algorithm, finding a collision for arbitrary hash function only needs O(2m/3) expected evaluations, where m is the size of hash space value. It is proved that the algorithm can obviously improve the attack efficiency for only needing O(2 74.7) expected evaluations, and this is more efficient than any known classical algorithm, and the consumed space of the algorithm equals the evaluation.展开更多
For the density operator(mixed state) describing squeezed chaotic light(SCL) we search for its thermal vacuum state(a pure state) in the real-fictitious space. Using the method of integration within ordered prod...For the density operator(mixed state) describing squeezed chaotic light(SCL) we search for its thermal vacuum state(a pure state) in the real-fictitious space. Using the method of integration within ordered product(IWOP) of operators we find that it is a kind of one- and two-mode combinatorial squeezed state. Its application in evaluating the quantum fluctuation of photon number reveals: the stronger the squeezing is, the larger a fluctuation appears. The second-order degree of coherence of SCL is also deduced which shows that SCL is classic. The new thermal vacuum state also helps to derive the Wigner function of SCL.展开更多
AD = 1 position-dependent mass approach to constructing nonlinear quantum states for a modified Coulomb potential is used to generate Gazeau–Klauder coherent states. It appears that their energy eigenvalues are scale...AD = 1 position-dependent mass approach to constructing nonlinear quantum states for a modified Coulomb potential is used to generate Gazeau–Klauder coherent states. It appears that their energy eigenvalues are scaled down by the quantum number and the nonlinearity coefficient. We study the basic properties of these states, which are found to be undefined on the whole complex plane, and some details of their revival structure are discussed.展开更多
I show how many connections of Γ?are presently existing from R?to β?as they are being inputted simultaneously through tensor products. I plan to address the Quantum state of this tensor connection st...I show how many connections of Γ?are presently existing from R?to β?as they are being inputted simultaneously through tensor products. I plan to address the Quantum state of this tensor connection step by step throughout the application presented. Also, I will show you how to prove that the connection is true for this tensor connection through its output method using a small bit of tensor calculus and mostly number theory.展开更多
Starting from Wigner’s definition of the function named now after him we systematically develop different representation of this quasiprobability with emphasis on symmetric representations concerning the canonical va...Starting from Wigner’s definition of the function named now after him we systematically develop different representation of this quasiprobability with emphasis on symmetric representations concerning the canonical variables (q,p) of phase space and using the known relation to the parity operator. One of the representations is by means of the Laguerre 2D polynomials which is particularly effective in quantum optics. For the coherent states we show that their Fourier transforms are again coherent states. We calculate the Wigner quasiprobability to the eigenstates of a particle in a square well with infinitely high impenetrable walls which is not smooth in the spatial coordinate and vanishes outside the wall boundaries. It is not well suited for the calculation of expectation values. A great place takes on the calculation of the Wigner quasiprobability for coherent phase states in quantum optics which is essentially new. We show that an unorthodox entire function plays there a role in most formulae which makes all calculations difficult. The Wigner quasiprobability for coherent phase states is calculated and graphically represented but due to the involved unorthodox function it may be considered only as illustration and is not suited for the calculation of expectation values. By another approach via the number representation of the states and using the recently developed summation formula by means of Generalized Eulerian numbers it becomes possible to calculate in approximations with good convergence the basic expectation values, in particular, the basic uncertainties which are additionally represented in graphics. Both considered examples, the square well and the coherent phase states, belong to systems with SU (1,1) symmetry with the same index K=1/2 of unitary irreducible representations.展开更多
We investigate the nonclassical properties of the photon-added-then-subtracted coherent squeezed state (PASCSS) via the sub-Poissonian statistics, the photon-number distribution, and the negativity of the Wigner fun...We investigate the nonclassical properties of the photon-added-then-subtracted coherent squeezed state (PASCSS) via the sub-Poissonian statistics, the photon-number distribution, and the negativity of the Wigner function. It is found that the PASSCS is a superposition state of D(β)S(ζ)|0〉, D(β)S(ζ)|1〉, and D(β)S(ζ)|2〉. We find that the Mandel Q parameter, the photon-number distribution, and the negative volume of the Wigner function of the PASCSS are all periodic functions of the compound Ф - 0/2 with a period π involved with squeezing and displacement parameteTs.展开更多
By religiously adhering to physics in spacetime and taking the final verdict of N.D. Mermin’s Ithaca interpretation of quantum mechanics seriously, Hardy’s paradox is completely resolved. It is then concluded that l...By religiously adhering to physics in spacetime and taking the final verdict of N.D. Mermin’s Ithaca interpretation of quantum mechanics seriously, Hardy’s paradox is completely resolved. It is then concluded that logical and mathematically consistent physical theories must be put in spacetime related formalism such as noncommutative geometry and E-infinity theory to avoid quantum paradoxes. At a minimum, we should employ the philosophy behind consistent quantum interpretation such as that of the famous Ithaca interpretation of D. Mermin.展开更多
The Copenhagen interpretation is the most authorized interpretation of quantum mechanics, but there are a number of ideas that are associated with the Copenhagen interpretation. It is ceratin that this fact is not nec...The Copenhagen interpretation is the most authorized interpretation of quantum mechanics, but there are a number of ideas that are associated with the Copenhagen interpretation. It is ceratin that this fact is not necessarily desirable. Thus, we propose a new interpretation of measurement theory, which is the linguistic aspect (or, the mathematical generalization) of quantum mechanics. Although this interpretation is superficially similar to a part of so-called Copenhagen interpretation, we show that it has a merit to be applicable to both quantum and classical systems. For example, we say that Bell’s inequality is broken even in classical systems.展开更多
In the first step the extremal values of the vibrational specific heat and entropy represented by the Planck oscillators at the low temperatures could be calculated. The positions of the extrema are defined by the dim...In the first step the extremal values of the vibrational specific heat and entropy represented by the Planck oscillators at the low temperatures could be calculated. The positions of the extrema are defined by the dimensionless ratios between the quanta of the vibrational energy and products of the actual temperature multiplied by the Boltzmann constant. It became evident that position of a local maximum obtained for the Planck’s average energy of a vibration mode and position of a local maximum of entropy are the same. In the next step the Haken’s time-dependent perturbation approach to the pair of quantum non-degenerate Schr<span style="white-space:nowrap;">?</span>dinger eigenstates of energy is re-examined. An averaging process done on the time variable leads to a very simple formula for the coefficients entering the perturbation terms.展开更多
文摘In this paper the evolution characteristics of the fidelity of quantum information for the V-type three-level atom interacting with number state light field in Kerr meddium are investigated. It shows that the periodicity of the evolutions of fidelity of quantum information is influenced by the Kerr coefficient, the photon number of the initial field and intensity of light. The evolutions of the fidelity of quantum information are modulated by the initial number state field. The Rabi oscillation frequency and the modulation frequency of fidelity for the field and the system vary with the value of the Kerr coefficient. The evolutions of fidelity of quantum information obviously show the quantum collapse and revival behaviours in the system of atom interacting with light field.
文摘The quantum phase properties of the generalized squeezed vacuum states associated with solvable quantum systems are studied by using the Pegg-Barnett formalism.Then,two nonclassical features,i.e.,squeezing in the number and phase operators,as well as the number-phase Wigner function of the generalized squeezed states are investigated.Due to some actual physical situations,the present approach is applied to two classes of generalized squeezed states:solvable quantum systems with discrete spectra and nonlinear squeezed states with particular nonlinear functions.Finally,the time evolution of the nonclassical properties of the considered systems has been numerically investigated.
文摘The existing decoy-state quantum key distribution(QKD)beating photon-number-splitting(PNS)attack provides a more accurate method to estimate the secure key rate,while it still considers that only single-photon pulses can generate secure keys in any case.However,multiphoton pulses can also generate secure keys if we can detect the possibility of PNS attack in the channel.The ultimate goal of this line of research is to confirm the absence of all types of PNS attacks.In particular,the PNS attack mentioned and detected in this paper is only the weaker version of PNS attack which significantly changes the observed values of the legitimate users.In this paper,under the null hypothesis of no weaker version of PNS attack,we first determine whether there is an attack or not by retrieving the missing information of the existing decoy-state protocols,extract a Cauchy distribution statistic,and further provide a detection method and the type I error probability.If the result is judged to be an attack,we can use the existing decoy-state method and the GLLP formula to estimate the secure key rate.Otherwise,the pulses with the same basis received including both single-photon pulses and multiphoton pulses,can be used to generate the keys and we give the secure key rate in this case.Finally,the associated experiments we performed(i.e.,the significance level is 5%)show the correctness of our method.
文摘In the existing formalism of quantum states, probability amplitudes of quantum states are complex numbers. A composition of entangled quantum states, such as a Bell state, cannot be decomposed into its constituent quantum states, implying that quantum states lose their identities when they get entangled. This is contrary to the observation that a composition of entangled quantum states decays back to its constituent quantum states. To eliminate this discrepancy, this paper introduces a new type of numbers, called virtual numbers, which produce zero upon multiplication with complex numbers. In the proposed formalism of quantum states, probability amplitudes of quantum states are general numbers made of complex and virtual numbers. A composition of entangled quantum states, such as a Bell state, can then be decomposed into its constituent quantum states, implying that quantum states retain their identities when they get entangled.
基金supported by the National Natural Science Foundation of China(Grant No.12004231).
文摘Topological phases and their associated multiple edge states are studied by constructing a one-dimensional non-unitary multi-period quantum walk with parity-time symmetry.It is shown that large topological numbers can be obtained when choosing an appropriate time frame.The maximum value of the winding number can reach the number of periods in the one-step evolution operator.The validity of the bulk-edge correspondence is confirmed,while for an odd-period quantum walk and an even-period quantum walk,they have different configurations of the 0-energy edge state andπ-energy edge state.On the boundary,two kinds of edge states always coexist in equal amount for the odd-period quantum walk,however three cases including equal amount,unequal amount or even only one type may occur for the even-period quantum walk.
文摘It is a fact that imaginary numbers do not have practical significance. But the role of imaginary numbers is very broad and enormous, due to the existence of Euler’s formula. Due to Euler’s formula, imaginary numbers have been applied in many theoretical theories. One of the biggest functions of imaginary numbers is to represent changes in phase, which is indispensable in signal analysis theory. The imaginary numbers in quantum mechanics pose a greater mystery: do the imaginary numbers really exist? This question still needs further scientific development to be answered.
文摘This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are discussed, along with quantum vulnerabilities in public key infrastructure and symmetric cryptographic algorithms. Other relevant non-encryption-specific areas within cybersecurity are similarly raised. The evolution and expansion of cyberwarfare as well as new developments in cyber defense beyond post-quantum cryptography and quantum key distribution are subsequently explored, with an emphasis on public and private sector awareness and vigilance in maintaining strong security posture.
基金Project supported by the National Natural Science Foundation of China (Grant No 10774108)
文摘Based on the fact that a two-mode squeezed number state is a two-variable Hermite polynomial excitation of the two-mode squeezed vacuum state, the result of one-mode l-photon measurement for the two-mode squeezed number state S2|m, n) is discussed. It is found that a remaining field-mode simultaneously collapses into a number state |n - m+l| with the coefficient being a Jacobi polynomial of n, m and l, which manifestly exhibits the entanglement between the two modes, i.e. it depends on the number-difference between the two modes. The second mode collapses into an excited coherent state when the first mode is measured as a coherent state.
基金supported by Natural Science Fund for Colleges and Universities in Hebei Province,China(Grant No.ZD2017031)the Doctoral Initial Funding of Hebei University of Science and Technology(Grant No.1181291)。
文摘The spin transport properties are theoretically investigated when a quantum dot(QD)is side-coupled to Majorana bound states(MBSs)driven by a symmetric dipolar spin battery.It is found that MBSs have a great effect on spin transport properties.The peak-to-valley ratio of the spin current decreases as the coupling strength between the MBS and the QD increases.Moreover,a non-zero charge current with two resonance peaks appears in the system.In the extreme case where the dot-MBS coupling strength is strong enough,the spin current and the charge current are both constants in the non-resonance peak range.When considering the effect of the Zeeman energy,it is interesting that the resonance peak at the higher energy appears one shoulder.And the shoulder turns into a peak when the Zeeman energy is big enough.In addition,the coupling strength between the two MBSs weakens their effects on the currents of the system.These results are helpful for understanding the MBSs signature in the transport spectra.
基金Project supported by the National Natural Science Foundation of China(Grant No.61502048)the Natural Science Foundation of Shanxi Province of China(Grant No.201801D221159)+1 种基金the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi Province of China(Grant No.2019L0470)Youth Research Foundation of Shanxi University of Finance and Economics in Shanxi Province of China(Grant No.QN-2016009)
文摘Quantum system is inevitably affected by the external environment in the real world.Two controlled quantum dialogue protocols are put forward based on logicalχ-type states under collective noise environment.One is against collectivedephasing noise,while the other is against collective-rotation noise.Compared with existing protocols,there exist several outstanding advantages in our proposed protocols:Firstly,theχ-type state is utilized as quantum channels,it possesses better entanglement properties than GHZ state,W state as well as cluster state,which make it difficult to be destroyed by local operations.Secondly,two kinds of logicalχ-type states are constructed by us in theory,which can be perfectly immune to the effects of collective noise.Thirdly,the controller can be offline after quantum distribution and permission announcement,without waiting for all the participants to complete the information coding.Fourthly,the security analysis illuminates that our protocols can not only be free from the information leakage,but also resist against the interceptand-resend attack,the entanglement-and-measure attack,the modification attack,the conspiring attack,and especially the dishonest controller’s attacks.
基金The project supported by the Natural Science Foundation of Hunan Province of China under Grant No. 03JJY6008
文摘In the classical lattice theory, solitons and localized modes can exist in many one-dimensional nonlinear lattice chains, however, in the quantum lattice theory, whether quantum solitons and localized modes can exist or not in the one-dimensional lattice chains is an interesting problem. By using the number state method and the Hartree approximation combined with the method of multiple scales, we investigate quantum solirons and localized modes in a one-dimensional lattice chain with the nonlinear substrate potential. It is shown that quantum solitons do exist in this nonlinear lattice chain, and at the boundary of the phonon Brillouin zone, quantum solitons become quantum localized modes, phonons are pinned to the lattice of the vicinity at the central position j = j0.
基金Supported by the National High Technology Research and Development Program(No.2011AA010803)the National Natural Science Foundation of China(No.U1204602)
文摘In order to improve the attack efficiency of the New FORK-256 function, an algorithm based on Grover's quantum search algorithm and birthday attack is proposed. In this algorithm, finding a collision for arbitrary hash function only needs O(2m/3) expected evaluations, where m is the size of hash space value. It is proved that the algorithm can obviously improve the attack efficiency for only needing O(2 74.7) expected evaluations, and this is more efficient than any known classical algorithm, and the consumed space of the algorithm equals the evaluation.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.1117511311447202and 11574295)
文摘For the density operator(mixed state) describing squeezed chaotic light(SCL) we search for its thermal vacuum state(a pure state) in the real-fictitious space. Using the method of integration within ordered product(IWOP) of operators we find that it is a kind of one- and two-mode combinatorial squeezed state. Its application in evaluating the quantum fluctuation of photon number reveals: the stronger the squeezing is, the larger a fluctuation appears. The second-order degree of coherence of SCL is also deduced which shows that SCL is classic. The new thermal vacuum state also helps to derive the Wigner function of SCL.
文摘AD = 1 position-dependent mass approach to constructing nonlinear quantum states for a modified Coulomb potential is used to generate Gazeau–Klauder coherent states. It appears that their energy eigenvalues are scaled down by the quantum number and the nonlinearity coefficient. We study the basic properties of these states, which are found to be undefined on the whole complex plane, and some details of their revival structure are discussed.
文摘I show how many connections of Γ?are presently existing from R?to β?as they are being inputted simultaneously through tensor products. I plan to address the Quantum state of this tensor connection step by step throughout the application presented. Also, I will show you how to prove that the connection is true for this tensor connection through its output method using a small bit of tensor calculus and mostly number theory.
文摘Starting from Wigner’s definition of the function named now after him we systematically develop different representation of this quasiprobability with emphasis on symmetric representations concerning the canonical variables (q,p) of phase space and using the known relation to the parity operator. One of the representations is by means of the Laguerre 2D polynomials which is particularly effective in quantum optics. For the coherent states we show that their Fourier transforms are again coherent states. We calculate the Wigner quasiprobability to the eigenstates of a particle in a square well with infinitely high impenetrable walls which is not smooth in the spatial coordinate and vanishes outside the wall boundaries. It is not well suited for the calculation of expectation values. A great place takes on the calculation of the Wigner quasiprobability for coherent phase states in quantum optics which is essentially new. We show that an unorthodox entire function plays there a role in most formulae which makes all calculations difficult. The Wigner quasiprobability for coherent phase states is calculated and graphically represented but due to the involved unorthodox function it may be considered only as illustration and is not suited for the calculation of expectation values. By another approach via the number representation of the states and using the recently developed summation formula by means of Generalized Eulerian numbers it becomes possible to calculate in approximations with good convergence the basic expectation values, in particular, the basic uncertainties which are additionally represented in graphics. Both considered examples, the square well and the coherent phase states, belong to systems with SU (1,1) symmetry with the same index K=1/2 of unitary irreducible representations.
基金Project supported by the National Natural Science Foundation of China (Grant No. 11264018)the Natural Science Foundation of Jiangxi Province of China (Grant No. 2010GQW0027)+1 种基金the Key Program Foundation of Ministry of Education of China (Grant No. 210115)the Sponsored Program for Cultivating Youths of Outstanding Ability in Jiangxi Normal University,China
文摘We investigate the nonclassical properties of the photon-added-then-subtracted coherent squeezed state (PASCSS) via the sub-Poissonian statistics, the photon-number distribution, and the negativity of the Wigner function. It is found that the PASSCS is a superposition state of D(β)S(ζ)|0〉, D(β)S(ζ)|1〉, and D(β)S(ζ)|2〉. We find that the Mandel Q parameter, the photon-number distribution, and the negative volume of the Wigner function of the PASCSS are all periodic functions of the compound Ф - 0/2 with a period π involved with squeezing and displacement parameteTs.
文摘By religiously adhering to physics in spacetime and taking the final verdict of N.D. Mermin’s Ithaca interpretation of quantum mechanics seriously, Hardy’s paradox is completely resolved. It is then concluded that logical and mathematically consistent physical theories must be put in spacetime related formalism such as noncommutative geometry and E-infinity theory to avoid quantum paradoxes. At a minimum, we should employ the philosophy behind consistent quantum interpretation such as that of the famous Ithaca interpretation of D. Mermin.
文摘The Copenhagen interpretation is the most authorized interpretation of quantum mechanics, but there are a number of ideas that are associated with the Copenhagen interpretation. It is ceratin that this fact is not necessarily desirable. Thus, we propose a new interpretation of measurement theory, which is the linguistic aspect (or, the mathematical generalization) of quantum mechanics. Although this interpretation is superficially similar to a part of so-called Copenhagen interpretation, we show that it has a merit to be applicable to both quantum and classical systems. For example, we say that Bell’s inequality is broken even in classical systems.
文摘In the first step the extremal values of the vibrational specific heat and entropy represented by the Planck oscillators at the low temperatures could be calculated. The positions of the extrema are defined by the dimensionless ratios between the quanta of the vibrational energy and products of the actual temperature multiplied by the Boltzmann constant. It became evident that position of a local maximum obtained for the Planck’s average energy of a vibration mode and position of a local maximum of entropy are the same. In the next step the Haken’s time-dependent perturbation approach to the pair of quantum non-degenerate Schr<span style="white-space:nowrap;">?</span>dinger eigenstates of energy is re-examined. An averaging process done on the time variable leads to a very simple formula for the coefficients entering the perturbation terms.